Linux is the mainstream UNIX-like platform of choice in the modern world. There are valid open source code base alternatives from which many businesses have benefited from. This is a different approach on both.

Linux VS open source UNIX

How to install Docker on Ubuntu 18.04
Operating System level virtualization is hitting hard now, as much as VM’s did just a few years ago. Docker is the popular framework for this matter, the new kid on the block so to speak. This is the hot spot now and if anyone wants to appear knowledgeable about system administration knowing this technology is […]

How to improve Apache HTTP performance on FreeBSD
There are some nice articles on the internet telling you how to improve your Apache HTTP server’s performance. I did my bit on FreeBSD land. While turning on a different MPM than the prefork default one increases Apache HTTP performance by a lot, it is not the only thing one may do. For example if […]

How to use find in GNU/Linux and FreeBSD
How to use find is a very basic, but important, UNIX lesson. Find is a very useful command which can help us not just finding a particular file, but for examples files or directories matching certain criteria such as: size, permissions, type. The basic mode of operation for find is the following: find path criteria […]

Why FreeBSD
In the following lines you will find a brief but sort of complete explanation about what is FreeBSD and why FreeBSD might be of your interest. If you are already a Mac or Linux user this could be more relevant for you than you would imagine. Enjoy. FreeBSD is an operating system, a unix-like operating […]

How to update FreeBSD using beadm
Beadm is a tool which provides a wonderful and distinctive functionality on Solaris, OpenIndiana and FreeBSD. It relies on the ZFS filesystem allowing to take a filesystem snapshot. That can be used to manage the so called boot environments which provide a great way to secure updates, even when everything goes down the tubes. Hence […]

Monitoring Systems (One)
Monitoring systems or how to get lost in fierce madness. There are many solutions to monitor systems and most of them have some kind of web interface to operate. Choosing the right tool for any job is a tedious task and for a newbie like me it is a bit harder, specially for a sensitive […]

How to analyze suspicious email
Millions of emails are sent and received every day. Most of them are just junk. And many among those are potentially harmful. Phishing still is one of the most effective ways for malicious actors to penetrate into well secured networks. The weakest link, too often, is the human factor. Training can help mitigate this 24×7 […]

How to mirror disks on FreeBSD’s ZFS
This article is not going to be a long, detailed, specialized how to. I just wanted to share the ease and the fantastic quality of ZFS for a dead simple need I had. A spare box with a spare disk doing nothing could be repurposed as a file share box at home. Mirroring the two […]

List of Speculative Execution Vulnerabilities
Vulnerability CVE Exploit name Public vulnerability name Firmware changes Spectre 2017-5753 Variant 1 Bounds Check Bypass (BCB) No Spectre 2017-5715 Variant 2 Branch Target Injection (BTI) Yes Meltdown 2017-5754 Variant 3 Rogue Data Cache Load (RDCL) No Spectre-NG 2018-3640 Variant 3a Rogue System Register Read (RSRE) Yes Spectre-NG 2018-3639 Variant 4 Speculative Store Bypass (SSB) […]
